Report Overview

  1. Visited public
    2025-04-16 08:15:07
    Tags
  2. URL

    github.com/Blank-c/Blank-Grabber/archive/refs/heads/main.zip

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    140.82.121.4

    #36459 GITHUB

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
6

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
github.com14232007-10-092016-07-132025-04-16
codeload.github.com623592007-10-092013-04-182025-04-09

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    codeload.github.com/Blank-c/Blank-Grabber/zip/refs/heads/main

  2. IP

    140.82.121.9

  3. ASN

    #36459 GITHUB

  1. File type

    Zip archive data, at least v1.0 to extract, compression method=store

    Size

    1.3 MB (1269524 bytes)

  2. Hash

    cf1622e33a46b0a9b7f88d0f031d679c

    6af28cb842e880d2121cc6f1ea9176c07d852bef

  1. Archive (25)

  2. FilenameMd5File type
    image.png
    f8262f15edbf09c8c1468a044721f58f
    PNG image data, 480 x 480, 8-bit/color RGB, non-interlaced
    update-hash.yml
    cd6fb9c927cb0d328385501edc02ab40
    ASCII text
    Builder.bat
    69f3538d09da509b93329b22fd59a956
    DOS batch file, ASCII text
    BlankOBF.py
    b3d2f59792b99d98107717d6b7100cf3
    Python script, ASCII text executable, with very long lines (351)
    cert
    b769e370f66299bca7f86932bc24925f
    data
    config.json
    17c98daace9d0baf81f6b9856c719c36
    JSON text data
    loader.py
    ca35548638710a32f6d4bc1a61a103c5
    Python script, ASCII text executable
    postprocess.py
    bbed9f3d87c4927b2b2bc16a6ec4da51
    Python script, ASCII text executable
    process.py
    8cc1b499d73f3fc2140a5b0c97afd6f2
    Python script, ASCII text executable
    rar.exe
    9c223575ae5b9544bc3d69ac6364f75e
    PE32+ executable (console) x86-64, for MS Windows, 7 sections
    rarreg.key
    4531984cad7dacf24c086830068c4abe
    ASCII text
    requirements.txt
    0717875d7e142fac144ac1e71d4ac6a0
    ASCII text
    run.bat
    5beaf38a2e57c2813f6b19b3fb08aca3
    DOS batch file, ASCII text, with very long lines (340)
    sigthief.py
    57156b83bcfa0c8cbc0fc36aa02a1617
    Python script, ASCII text executable
    stub.py
    6dc9bbb14ef14c45d4d5d4128dbeb5ef
    Python script, ASCII text executable, with very long lines (1344)
    upx.exe
    8a98406e32ed6139bd9e75342d452948
    PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows, 3 sections
    version.txt
    dbeadc0f19f3e284489e638819266912
    Unicode text, UTF-8 text
    hash
    cc56774b629cd17fe887ccabf5461161
    JSON text data
    icon.ico
    d53754dda80461501b1937e581f192e6
    MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
    unblock_sites.py
    0d1019573b112545f9fd41a4e0acc342
    Python script, ASCII text executable, with very long lines (482)
    READme.txt
    10a5016f49ef1acacd6998ace35d85e6
    ASCII text
    gui.py
    d4516f5f779e1f422bb4fd3f204e1f2e
    Python script, ASCII text executable, with very long lines (390)
    LICENSE
    0d529b5142a9a8ca2737b546fa1d5321
    ASCII text
    README.md
    9526a8f5daab4607c86f79793ca7659d
    Unicode text, UTF-8 text, with very long lines (424)
    changelog.md
    69b5d5379cc6ac58537fb1d83d148b05
    ASCII text

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    YARAhub by abuse.chmalware
    Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
    YARAhub by abuse.chmalware
    Detects file containing Telegram Bot API
    YARAhub by abuse.chmalware
    Detects file containing Telegram Bot API
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize
github.com/Blank-c/Blank-Grabber/archive/refs/heads/main.zip
140.82.121.3302 Found1.3 MB
codeload.github.com/Blank-c/Blank-Grabber/zip/refs/heads/main
140.82.121.9200 OK1.3 MB